Tran Trung Duy | PTIT (original) (raw)
Papers by Tran Trung Duy
Journal of Science and Technology on Information and Communications, 2022
Electronics, 2020
In this paper, the optimization of downlink beamforming vectors, uplink transmission power, and p... more In this paper, the optimization of downlink beamforming vectors, uplink transmission power, and power-splitting factors is investigated for a secure two-way SWIPT network in the presence of a hidden eavesdropper and non-linear energy harvesting circuits over both perfect and imperfect channels. The eavesdropper is inactive, so its channel information is not available at the base stations (BSs). The purpose of artificial noise is to create downlink interference with the hidden eavesdropper as much as possible, while satisfying the quality of service for two-way communications. For perfect downlink channels, the semidefinite relaxation (SDR) technique is exploited, and the optimal matrices are proven to satisfy rank-1 conditions, thus providing the optimal beamforming vectors. For imperfect downlink channel state information, we propose an iterative algorithm with a penalty function to obtain the approximate rank-1 matrices. On uplink, we attain the optimal transmission power for user...
1 Original Article Combining Power Allocation and Superposition Coding for an Underlay Two-way De... more 1 Original Article Combining Power Allocation and Superposition Coding for an Underlay Two-way Decode-and-forward Scheme Pham Ngoc Son, Tran Trung Duy, Phuc Quang Truong, Son Ngoc Truong, Pham Viet Tuan, Van-Ca Phan, Khuong Ho-Van Ho Chi Minh City University of Technology and Education, Vo Van Ngan Street, Thu Duc City, Ho Chi Minh City, Vietnam Posts and Telecommunications Institute of Technology, Nguyen Dinh Chieu Street, District 1, Ho Chi Minh City, Vietnam University of Education, Hue University, Le Loi Street, Hue City, Vietnam Ho Chi Minh City University of Technology (HCMUT), Ly Thuong Kiet Street, District 10, Ho Chi Minh City, Vietnam Vietnam National University Ho Chi Minh City, Ho Chi Minh City, Vietnam
2018 IEEE Seventh International Conference on Communications and Electronics (ICCE), 2018
In this study, we consider multiuser multi-input single-output (MISO) beamforming design in under... more In this study, we consider multiuser multi-input single-output (MISO) beamforming design in underlay cognitive radio networks in the presence of a primary user (PU) and eavesdropper (Eve). We propose a multi-objective optimization problem (MOOP) for balancing two conflicting design objectives: maximizing the total intended power received at secondary receivers and minimizing the interference power at the PU, while satisfying the secrecy rate and PU interference threshold constraints. The MOOP was solved by a weighted sum method and semidefinite programming relaxation (SDR), and the rank-one optimal solutions were drawn with explanations. The upper and lower bounds were found by solving the single-objective and zero-forcing beamforming problems. The simulation results demonstrated a trade-off between the objectives in the Pareto optimal set, no improvement of performance with artificial noise, and better results with increasing number of transmission antennas.
Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, 2019
In this paper, we propose three path selection methods for cluster-based cognitive radio (CR) net... more In this paper, we propose three path selection methods for cluster-based cognitive radio (CR) networks for secrecy enhancement by formulating the probability of non-zero secrecy capacity (PNSC). In the proposed work, it is assumed that uniform transmit power for the secondary transmitters and jammers must be adjusted to guarantee quality of service (QoS) of the primary network, follows a simple and efficient power allocation strategy. To improve the channel capacity, the best receiver is selected at each cluster to relay the source data to the next hop. Additionally, a jammer is randomly chosen at each cluster to generate noises on an eavesdropper, and to reduce the quality of the eavesdropping links. Three methods are studied in this paper. First, we propose the BEST path selection method (BEST) to maximize the end-to-end instantaneous secrecy capacity. Second, the path obtaining the MAXimum Value for the average end-to-end PNSC (MAXV) is selected for data transmission. Third, we also propose a RAND method in which a RANDom path is employed. For performance evaluation and comparison, we derive exact closed-form expressions for the end-to-end PNSC of the BEST, MAXV and RAND methods over Rayleigh fading channel. Monte Carlo simulations are then performed to verify the derived theoretical results.
EAI Endorsed Transactions on Industrial Networks and Intelligent Systems, 2021
AEU - International Journal of Electronics and Communications, 2020
Computer Communications, 2018
TELKOMNIKA (Telecommunication Computing Electronics and Control), 2019
Lecture Notes in Electrical Engineering, 2019
In this paper, we evaluate throughput of a power beacon-aided multi-hop relaying networks employi... more In this paper, we evaluate throughput of a power beacon-aided multi-hop relaying networks employing non-orthogonal multiple access (NOMA). In the proposed protocol, the source data are sent to the destination via the multi-hop transmission model. In addition, the source and relay nodes have to harvest energy the radio frequency (RF) signals generated by a power beacon. For performance evaluation, we derive an exact closed-form expression of throughput for the proposed scheme over Rayleigh fading channel and under impact of imperfect transceiver hardware. We finally perform simulation results to verify the theoretical results.
International Journal of Communication Systems, 2018
Lecture Notes in Electrical Engineering, 2016
In this paper, we propose joint relay and jammer selection protocols to enhance secrecy performan... more In this paper, we propose joint relay and jammer selection protocols to enhance secrecy performance for cluster-based multi-hop networks. In particular, without channel state information (CSI) of the eavesdropping links, one of available nodes at each cluster is selected to forward the source data, relying on the CSI of the data links, while a jammer node is randomly chosen to generate artificial noises to an eavesdropper. We also investigate the impact of hardware noises on the secrecy performance of the proposed protocols. When the transceiver hardware is perfect, we derive exact closed-form expressions of secrecy outage probability (SOP) for the proposed protocols over Rayleigh fading channel. We then perform Monte Carlo based computer simulations to verify the theoretical results.
Advances in Electrical and Electronic Engineering, 2016
In this paper, we evaluate performances of various user selection protocols under impact of hardw... more In this paper, we evaluate performances of various user selection protocols under impact of hardware impairments. In the considered protocols, a Base Station (BS) selects one of available Users (US) to serve, while the remaining USs harvest the energy from the Radio Frequency (RF) transmitted by the BS. We assume that all of the US randomly appear around the BS. In the Random Selection Protocol (RAN), the BS randomly selects a US to transmit the data. In the second proposed protocol, named Minimum Distance Protocol (MIND), the US that is nearest to the BS will be chosen. In the Optimal Selection Protocol (OPT), the US providing the highest channel gain between itself and the BS will be served. For performance evaluation, we derive exact and asymptotic closed-form expressions of average Outage Probability (OP) over Rayleigh fading channels. We also consider average harvested energy per a US. Finally, Monte-Carlo simulations are then performed to verify the theoretical results.
Journal of Science and Technology on Information and Communications, 2022
Electronics, 2020
In this paper, the optimization of downlink beamforming vectors, uplink transmission power, and p... more In this paper, the optimization of downlink beamforming vectors, uplink transmission power, and power-splitting factors is investigated for a secure two-way SWIPT network in the presence of a hidden eavesdropper and non-linear energy harvesting circuits over both perfect and imperfect channels. The eavesdropper is inactive, so its channel information is not available at the base stations (BSs). The purpose of artificial noise is to create downlink interference with the hidden eavesdropper as much as possible, while satisfying the quality of service for two-way communications. For perfect downlink channels, the semidefinite relaxation (SDR) technique is exploited, and the optimal matrices are proven to satisfy rank-1 conditions, thus providing the optimal beamforming vectors. For imperfect downlink channel state information, we propose an iterative algorithm with a penalty function to obtain the approximate rank-1 matrices. On uplink, we attain the optimal transmission power for user...
1 Original Article Combining Power Allocation and Superposition Coding for an Underlay Two-way De... more 1 Original Article Combining Power Allocation and Superposition Coding for an Underlay Two-way Decode-and-forward Scheme Pham Ngoc Son, Tran Trung Duy, Phuc Quang Truong, Son Ngoc Truong, Pham Viet Tuan, Van-Ca Phan, Khuong Ho-Van Ho Chi Minh City University of Technology and Education, Vo Van Ngan Street, Thu Duc City, Ho Chi Minh City, Vietnam Posts and Telecommunications Institute of Technology, Nguyen Dinh Chieu Street, District 1, Ho Chi Minh City, Vietnam University of Education, Hue University, Le Loi Street, Hue City, Vietnam Ho Chi Minh City University of Technology (HCMUT), Ly Thuong Kiet Street, District 10, Ho Chi Minh City, Vietnam Vietnam National University Ho Chi Minh City, Ho Chi Minh City, Vietnam
2018 IEEE Seventh International Conference on Communications and Electronics (ICCE), 2018
In this study, we consider multiuser multi-input single-output (MISO) beamforming design in under... more In this study, we consider multiuser multi-input single-output (MISO) beamforming design in underlay cognitive radio networks in the presence of a primary user (PU) and eavesdropper (Eve). We propose a multi-objective optimization problem (MOOP) for balancing two conflicting design objectives: maximizing the total intended power received at secondary receivers and minimizing the interference power at the PU, while satisfying the secrecy rate and PU interference threshold constraints. The MOOP was solved by a weighted sum method and semidefinite programming relaxation (SDR), and the rank-one optimal solutions were drawn with explanations. The upper and lower bounds were found by solving the single-objective and zero-forcing beamforming problems. The simulation results demonstrated a trade-off between the objectives in the Pareto optimal set, no improvement of performance with artificial noise, and better results with increasing number of transmission antennas.
Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, 2019
In this paper, we propose three path selection methods for cluster-based cognitive radio (CR) net... more In this paper, we propose three path selection methods for cluster-based cognitive radio (CR) networks for secrecy enhancement by formulating the probability of non-zero secrecy capacity (PNSC). In the proposed work, it is assumed that uniform transmit power for the secondary transmitters and jammers must be adjusted to guarantee quality of service (QoS) of the primary network, follows a simple and efficient power allocation strategy. To improve the channel capacity, the best receiver is selected at each cluster to relay the source data to the next hop. Additionally, a jammer is randomly chosen at each cluster to generate noises on an eavesdropper, and to reduce the quality of the eavesdropping links. Three methods are studied in this paper. First, we propose the BEST path selection method (BEST) to maximize the end-to-end instantaneous secrecy capacity. Second, the path obtaining the MAXimum Value for the average end-to-end PNSC (MAXV) is selected for data transmission. Third, we also propose a RAND method in which a RANDom path is employed. For performance evaluation and comparison, we derive exact closed-form expressions for the end-to-end PNSC of the BEST, MAXV and RAND methods over Rayleigh fading channel. Monte Carlo simulations are then performed to verify the derived theoretical results.
EAI Endorsed Transactions on Industrial Networks and Intelligent Systems, 2021
AEU - International Journal of Electronics and Communications, 2020
Computer Communications, 2018
TELKOMNIKA (Telecommunication Computing Electronics and Control), 2019
Lecture Notes in Electrical Engineering, 2019
In this paper, we evaluate throughput of a power beacon-aided multi-hop relaying networks employi... more In this paper, we evaluate throughput of a power beacon-aided multi-hop relaying networks employing non-orthogonal multiple access (NOMA). In the proposed protocol, the source data are sent to the destination via the multi-hop transmission model. In addition, the source and relay nodes have to harvest energy the radio frequency (RF) signals generated by a power beacon. For performance evaluation, we derive an exact closed-form expression of throughput for the proposed scheme over Rayleigh fading channel and under impact of imperfect transceiver hardware. We finally perform simulation results to verify the theoretical results.
International Journal of Communication Systems, 2018
Lecture Notes in Electrical Engineering, 2016
In this paper, we propose joint relay and jammer selection protocols to enhance secrecy performan... more In this paper, we propose joint relay and jammer selection protocols to enhance secrecy performance for cluster-based multi-hop networks. In particular, without channel state information (CSI) of the eavesdropping links, one of available nodes at each cluster is selected to forward the source data, relying on the CSI of the data links, while a jammer node is randomly chosen to generate artificial noises to an eavesdropper. We also investigate the impact of hardware noises on the secrecy performance of the proposed protocols. When the transceiver hardware is perfect, we derive exact closed-form expressions of secrecy outage probability (SOP) for the proposed protocols over Rayleigh fading channel. We then perform Monte Carlo based computer simulations to verify the theoretical results.
Advances in Electrical and Electronic Engineering, 2016
In this paper, we evaluate performances of various user selection protocols under impact of hardw... more In this paper, we evaluate performances of various user selection protocols under impact of hardware impairments. In the considered protocols, a Base Station (BS) selects one of available Users (US) to serve, while the remaining USs harvest the energy from the Radio Frequency (RF) transmitted by the BS. We assume that all of the US randomly appear around the BS. In the Random Selection Protocol (RAN), the BS randomly selects a US to transmit the data. In the second proposed protocol, named Minimum Distance Protocol (MIND), the US that is nearest to the BS will be chosen. In the Optimal Selection Protocol (OPT), the US providing the highest channel gain between itself and the BS will be served. For performance evaluation, we derive exact and asymptotic closed-form expressions of average Outage Probability (OP) over Rayleigh fading channels. We also consider average harvested energy per a US. Finally, Monte-Carlo simulations are then performed to verify the theoretical results.
IET Communications, 2016
This paper considers a dual-hop cognitive inter-vehicular relay-assisted communication system whe... more This paper considers a dual-hop cognitive inter-vehicular relay-assisted communication system where all communication links are non-line of sight ones and their fading is modeled by the double Rayleigh fading distribution. Roadside relays (or access points) implementing the decode-and-forward (DF) relaying protocol are employed and one of them is selected according to a predetermined policy in order to enable communication between vehicles. The performance of the considered cognitive cooperative system is investigated for Kth best partial and full relay selection (RS) as well as for two distinct fading scenarios. In the first scenario, all channels are double Rayleigh distributed. In the second scenario, only the secondary source to relay and relay to destination channels are considered to be subject to double Rayleigh fading whereas, channels between the secondary transmitters and the primary user are modeled by the Rayleigh distribution. Exact and approximate expressions for the outage probability performance for all considered RS policies and fading scenarios are presented. In addition to the analytical results, complementary computer simulated performance evaluation results have been obtained by means of Monte Carlo simulations. The perfect match between these two sets of results has verified the accuracy of the proposed mathematical analysis.